Bonchev Information Technologies and Systems
Software for organizations and people.
Storing Private Key Hi guest
Sign up - Login
Learning Home Safe Online Communication Make Your Website Trusted How to Store Private Keys  

Learn how to store and maintain Private Keys securely

Using Public-Private Key encryption and authentication brings many benefits, but has one important requirement which must be observed in order for it to work. Namely, the private keys must be kept secret so that encrypted data cannot be decrypted by unauthorized entities and the owner of the private key cannot be impersonated.
  1. Private keys must never be transmitted in plain format over a network. If you have to transmit it, at the very least you must encrypt it locally, then transmit it, and finally decrypt it locally on the recipient side. You can use asymmetric or symmetric encryption as appropriate.
  2. Private keys must be never stored on a server where anyone unauthorized to see the key will have access to it. For example, private keys must never be uploaded on a shared hosting server, even if stored in a private folder, since the administrators have access to it.
  3. There should be a copy of the private key on a media (CD, etc) or device (flash drive, etc). The media or device must be stored in a physical location in which they will be safe and secure. It is also good practice to store the key in an encrypted format.
  4. Depending on the circumstances, it may be good practice to keep a work copy of the private key on a media or device and access it from there.
  5. There are two possible solutions in an environment where the private key must be handled by more than one person (individual or organization) where the key must be present only, and only when all persons or their representatives are present.
    • Split the private key to pieces using the Split File functionality of the Quantifier module of Act On File and give one piece of the private key to each person. Later, when the private key is required, use the Join Files functionality of the Quantifier module to recreate the private key. It is advisable that the individual pieces are stored in a secure manner as any fully functional private key. Note that it is important to join the pieces in the same order as they were split. Using split by template would append an appropriate piece number to each newly extracted piece from the private key. Later when joining them the pieces can be easily ordered by this number and correctly joined to recreate the private key.
    • Encrypt the private key once for each person with their private encryption using the Encrypt Files functionality of the Cryptor module of Act On File. Lather when the private key is required use the Decrypt Files functionality of the Cryptor module to restore the private key to its original form. Note that the decryptions must be made by each participating person, and in order reverse to the order in which the key was encrypted.
  6. Using suitable specialized software for password and key maintenance and storage may be also advisable and good practice.
Go Back to Learning
Community Content
(To enter your comments you must be signed in. Log in or create FREE account.)
Be the first to comment.
The ELIAS Project
Fine Art App
Information Presenter
Act On File
Audio Control
Photo Window
Information Presenter
for Museums and Art galleries
for Schools and Universities
for Resorts, Hotels and Cruises
for Parks of any kind
for Corporations
for any business
Encryption and Authentication
Safe Online Communication
Website Testimonials
Learn how to store private keys
Make The Most From Your Files
Convenient Volume Control
Photo Window - an Awesome Gift
My Account
FAQ - Forum
Email this page
Bonchev IT
Public Authentication Key
Public Encryption Key

© Copyright 2024 Bonchev Information Technologies. All Rights Reserved.
Machine translation:

Email this page
use semicolon to separate emails eg:;
a link to this page will be automatically added to your message
Please type the anti-bot text below.
Type text:
Thank you for subscribing to the MBBSoftware newsletter.
Enter your email address:
Please type the anti-bot text below.
Type text: